The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Jun MURAI(27hit)

1-20hit(27hit)

  • Delay Aware Two-Step Timers for Large Groups Scalability

    Achmad Husni THAMRIN  Hidetaka IZUMIYAMA  Hiroyuki KUSUMOTO  Jun MURAI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    437-444

    This paper investigates modified random timers based on uniform and exponentially distributed timers for feedback scalability for large groups. We observe the widely-used probability distribution functions and propose new ones that are aware of network delays. The awareness of network delays of our proposed modified p.d.fs proves to be able to achieve lower expected number of messages compared to the original ones given that the parameters are optimized for the network variables: the number of receivers, and the network delay. In our analysis we derive an equation to estimate the optimized parameter based on these network variables. We also simulate the p.d.fs for heterogenous network delays and find that each receiver only needs to be aware of its network delay.

  • Enhanced Mobile Network Protocol for Its Robustness and Policy Based Routing

    Ryuji WAKIKAWA  Susumu KOSHIBA  Thierry ERNST  Julien CHARBON  Keisuke UEHARA  Jun MURAI  

     
    PAPER-Mobile Networking

      Vol:
    E87-B No:3
      Page(s):
    445-452

    In this paper, we discuss the performance of a basic scheme to support network mobility. Network mobility arises when an entire network segment, such as a network inside a vehicle, changes its topological location and thus its access point to the fixed backbone network. Mechanisms to support network mobility are necessary to maintain sessions. The approach followed by the IETF (NEMO Basic Support) and us (B-ORC) is to establish a bi-directional tunnel between the mobile network and the Internet. As we show, this bi-directional tunnel is a performance bottleneck and leads to single points of failure. In order to address the issues of the existing mobile network architecture, we propose enhanced operations of the basic mobile network protocol to achieve reliability and efficiency: (1) multiple bi-directional tunnels between the mobile network and the Internet, and (2) policy-based routing. The proposed operations could be realized by extending the existing architecture and protocol. The performance of various multihoming configurations is evaluated based on the implementation of our own basic scheme. The evaluation criteria are delay, throughput and latency. The results are encouraging and show we can achieve a better throughput.

  • Practical Resource Adaptation for Broadband Application Using Portable Computers

    Kazunori SUGIURA  Akimichi OGAWA  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E85-D No:8
      Page(s):
    1258-1268

    In this paper, we implemented practical resource adaptation mechanism for broadband application environment especially suitable for portable computers (note PCs) with limited power supply. Continuous development of portability enhancement and increasing computation with less power consumption for battery operating environment in note PC equips with intelligent resource controlling mechanism embedded inside the hardware. In such environment, where occasional environmental changes take in place rapidly, adaptive and collaborative controls of resources are required. Optimization of resource based on power supply management is dedicated to the operating environment. Bi-directional, user, application, operating system and device aware interface for resource configuration/management is extended to the current Unix operating system by implementing application programming interface of Advanced Configuration and Power Interface (ACPI). Traditional operating system conceals the active device probing and controlling method autonomously. Implementation of "State handler daemon" interface enables applications and application users to monitor and adapt the resources available during the operation. Thick collaboration between application and devices that are reserved in its limited environments economizes the consuming device utilization resulting: for example, life extension of battery life and effective network bandwidth adaptation. We focused on DVTS (Digital Video Transport System) as a typical broadband application. Evaluation shows 125 minutes of continuous battery operation with battery life extension compared to 70 minutes with traditional systems. Collaboration with network device management enables 100% packet transfer compared to 89% without any Resource adaptations.

  • An Integrity Check for the Conflict Origin AS Prefixes in the Inter-domain Routing

    Kengo NAGAHASHI  Hiroshi ESAKI  Jun MURAI  

     
    PAPER-MPLS and Routing

      Vol:
    E86-B No:2
      Page(s):
    526-533

    In the Internet, the routing system consists of the Interior-domain and the Inter-domain. Within the Inter-domain routing, Autonomous System (AS) represents the administrative network domain, which is managed by a single institution with its operational policy. ASs exchange the ASs' reachability information to each other. Without the Inter-domain routing scheme, the nodes in the Internet can't communicate across the multiple ASs. The Inter-domain routing is an essential functional element in the global Internet operation. However, due to several reasons such as miss-configuration at the routers, the Inter-domain routing becomes unstable. This occurs that one AS (say AS1) propagates the prefix that has been already assigned to another AS (say AS2) and other peers receive its routing update and inject the misconfigured AS information to their peering routers. Since the routing information associated with AS1 is over written by AS2, AS1 loses the network connectivity. This problem is known as the Conflict Origin AS prefix or the Multiple Origin AS. We recognize that this is a serious problem which degrades the quality of Internet backbone infrastructure. We focus on this problem and propose the mechanism that can detect the Conflict Origin AS prefix automatically using the policy database. Based on the evaluation using the prototype system, we demonstrate that the proposed mechanism can work well with the existing Internet's Inter-domain routing system.

  • MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    Hajime TAZAKI  Rodney Van METER  Ryuji WAKIKAWA  Thirapon WONGSAARDSAKUL  Kanchana KANCHANASUT  Marcelo DIAS DE AMORIM  Jun MURAI  

     
    PAPER

      Vol:
    E93-B No:8
      Page(s):
    2004-2011

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  • Architecture for IP Multicast Deployment: Challenges and Practice Open Access

    Hitoshi ASAEDA  Shinsuke SUZUKI  Katsushi KOBAYASHI  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E89-B No:4
      Page(s):
    1044-1051

    IP multicast technology is highly advantageous for various applications and future needs in the Internet. Yet, it is generally recognized that the IP multicast routing protocol is fairly complex and non-scalable and requires additional maintenance and operational cost to network administrators. Although there has been much research related to IP multicast and most router vendors already support basic IP multicast routing protocols, there is still a big gap between what is reported as the state-of-the-art in the literature from what is implemented in practice. In this paper, we clarify the complexities of traditional multicast communication and describe possible solutions using the one-to-many multicast communication model called Source-Specific Multicast (SSM). We explain this communication model and the corresponding routing architecture and examine the statistics obtained for the number of multicast routing entries in our backbone router, which is connected to the international backbone. We also introduce our international collaboration activities that are contributing to the deployment and promotion of IP multicast services in the Internet.

  • Permissible Link Quality for RFID Anti-Collision in a Practical Environment

    Yuusuke KAWAKITA  Osamu NAKAMURA  Jun MURAI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E91-B No:5
      Page(s):
    1480-1489

    UHF radio frequency identification (RFID) has gathered significant interest in the field of long-distance automatic identification applications. Since UHF RFID shares the frequency band with other RFID and/or other wireless systems, it is important to determine how much interference can be applied without causing a significant degradation of anti-collision speed. In this paper, the permissible link quality for RFID anti-collision in a practical environment is discussed by considering an erroneous communication link, taking into account of bit encoding and the type of interference. We approach the quantification of permissible link quality experimentally along with protocol simulations and the mathematical analyses. An international standard protocol, employing frame slotted ALOHA, was used as the air protocol. For these investigations, the present authors developed a protocol simulator. The simulation results were compared with analytical values based on Poisson distribution. The investigation in the return (tag to reader) link, and the forward (reader to tag) link, were analyzed separately. As result of the protocol simulation, it is generally important to secure the Pulse Error Rate 10-4 or better in both return and forward links for the anti-collision of 64 or less tags. The quality of the return link may be relaxed when the application does not require fast anti-collision. The degradation of the forward link, on the other hand, may entail loss of important commands, resulting in extremely slow anti-collision. It is measured experimentally that the required link quality can be relaxed by up to 10 dB in the return links and by 5 dB in the forward link when the primary source of interference originates in the interfering readers.

  • Distributed Mobility Management Scheme for Mobile IPv6

    Ryuji WAKIKAWA  Guillaume VALADON  Noriyuki SHIGECHIKA  Jun MURAI  

     
    PAPER

      Vol:
    E92-B No:1
      Page(s):
    77-84

    Mobile IPv6 and Network Mobility (NEMO) have been standardized as IP extensions. While these technologies are planned to be adopted by several communities, such as the vehicle, aviation, and cellular industries, Mobile IPv6 has serious deployment issues such as scalability, protocol resilience, and redundancy. In these technologies, a special router called a home agent is introduced to support the movement of mobile nodes. This home agent introduces overlapping, inefficient routes, and becomes a single point of failure and a performance bottleneck. In this paper, a new concept for scalable and dependable mobility management scheme is proposed. Multiple home agents serve the same set of mobile nodes. The Home Agent Reliability protocol and Home Agent migration are introduced to achieve this concept. We also propose an overlay network named a Global Mobile eXchange (GMX) that efficiently handles data traffic from and to mobile nodes, and operates home agents as would an Internet eXchange Point (IXP).

  • Routing Optimization for Nested Mobile Networks

    Masafumi WATARI  Thierry ERNST  Ryuji WAKIKAWA  Jun MURAI  

     
    PAPER

      Vol:
    E89-B No:10
      Page(s):
    2786-2793

    Network Mobility (NEMO) Basic Support is the standard protocol to provide continuous network connectivity and movement transparency to a group of nodes moving together, as in a vehicle. However, the protocol suffers from sub-optimal routing and packet overhead caused by a bi-directional tunnel between the Mobile Router (MR) connecting the mobile network to the Internet and its Home Agent (HA). When a nested NEMO is formed, these inefficiencies become intolerable for real-time multimedia applications. To optimize the delivery of these packets, this study proposes Optimized NEMO (ONEMO) that is capable of providing an optimal path with minimum packet overhead in various scenarios with nested mobility. The protocol is designed to offer the path with minimum signaling overhead and functional requirements are limited to its MRs. Evaluation through measurements against NEMO Basic Support and comparison among other solutions showed effectiveness of the protocol.

  • Operation of a Root DNS Server

    Akira KATO  Jun MURAI  

     
    INVITED PAPER-Internet Operation

      Vol:
    E84-B No:8
      Page(s):
    2033-2038

    The authors have been in charge of the operation of one of the root DNS servers for more than three years. In this paper, the overview of our system to provide high availability is introduced. In the following sections, a traffic analysis system to analyze the characteristics of the DNS queries and the brief summary which may help future DNS system deployment is described.

  • Drouting Architecture: Improvement of Failure Avoidance Capability Using Multipath Routing

    Yasuhiro OHARA  Hiroyuki KUSUMOTO  Osamu NAKAMURA  Jun MURAI  

     
    PAPER-Network

      Vol:
    E91-B No:5
      Page(s):
    1403-1415

    Failure avoidance capability is a desired feature for telecommunication networks, such as the Internet. However, not all failures can be promptly bypassed on the Internet because routing systems that are responsible for detecting and avoiding failures cannot detect all failures. Consequently, failures can interrupt internet communications for a long time, such as a few hours. This paper proposes a novel routing architecture called Drouting that enables flexible failure avoidance. In Drouting, routers calculate multipaths from a source to a destination by constructing Directed Acyclic Graphs (DAGs) that include all links in the intra-domain network graph. IP packets carry packet tags that are set by the end host. The packet tags are used to select a network path from the multipath routes. In this paper, the failure avoidance property of Drouting architecture is evaluated through comparison with another proposal, Deflection, using simulations. Simulations were performed on inferred and synthetic topologies. Drouting exhibits similar performance with Deflection in terms of the number of nexthops, the number of paths and the length of paths, while Drouting outperforms Deflection in the probability of success of failure avoidance.

  • Congestion Control Mechanism for TCP with Packet Pair Scheme

    Yoshifumi NISHIDA  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E82-D No:4
      Page(s):
    854-862

    Congestion Control Scheme of TCP/IP protocol suite is established by Transmission Control Protocol (TCP). Using the self-clocking scheme, TCP is able to maintain a quick optimum connection status for the network path, unless it is given an excessive load to carry to the network. However, in wide area networks, there are some obstructive factors for the self-clocking scheme of TCP. In this paper, we describe the obstructive factors for the self-clocking scheme. We propose a new congestion control scheme using a packet pair scheme and a traffic-shaping scheme. In combining these schemes with TCP, new TCP options and a modification for TCP congestion control algorithms are added. Using our scheme, TCP is able to maintain smooth self-clocking. We implemented this scheme on a network simulator for evaluation. Compared with normal TCP, this scheme was demonstrated to be over 20% more efficient in symmetric communication and over 40% more efficient in asymmetric communication.

  • IPv4 Traversal for the NEMO Basic Support Protocol by IPv4 Care-of Address Registration

    Ryuji WAKIKAWA  Carl WILLIAMS  Keisuke UEHARA  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E88-B No:4
      Page(s):
    1331-1337

    On the Internet, two different IP protocols are deployed such as IPv4 and IPv6. The Mobile Router uses the basic NEMO protocol which is IPv6 protocol specific. During the early period of time that IPv6 transition is occurring it is very likely that a Mobile Router will move to an IPv4 only access network. When this occurs the Mobile Router will no longer be able to operate using the basic NEMO protocol. There has already been some earlier work to provide IPv6 capability over an IPv4 access network for a Mobile Router. This paper provides a capability by to maintain IPv6 connectivity for the Mobile Router via its Home Agent with IPv4-in-IPv6 encapsulation with no special boxes to be deployed elsewhere in the network.

  • Reduction Over Time to Facilitate Peer-to-Peer Barter Relationships

    Kenji SAITO  Eiichi MORINO  Jun MURAI  

     
    PAPER-Peer-to-Peer Network

      Vol:
    E89-D No:1
      Page(s):
    181-188

    A peer-to-peer complementary currency can be a powerful tool for promoting exchanges and building relationships on the Internet. iWAT [1] is a proposed such currency based on the WAT System [2], a polycentric complementary currency using WAT tickets as its media of exchange: participants spontaneously issue and circulate the tickets as needed, whose values are backed up by chains of trust. iWAT implements the tickets electronically by exchanging messages signed in OpenPGP [3]. This paper investigates an extension to the design of iWAT to facilitate mutual help among peers in need. In particular, we investigate additional "reduction" tickets whose values are reduced over time. By deferring redemption of such tickets, the participants can contribute to reduce the debts of the issuers, and the issuers help participants by providing exchange media that accelerate spending. This paper describes in detail how incentive-compatibility is achieved by this extended design; we predict that the following properties will hold, which resulted from a game-theoretical analysis.1. Rapid circulation, or a reduction ticket will typically circulate at high speed until its effective value reaches the scheduled minimum, and2. Vanishment equilibrium, or the system will be most stable if the values of tickets are to be reduced down to zero. A reference implementation of iWAT has been developed in the form of a plug-in for an XMPP [4],[5] instant messaging client. We have been putting the currency system into practical use, to which the proposed feature has been added.

  • Large-Scale Cooperative Dissemination of Governmental Information in Emergency – An Experiment and Future Strategies Open Access

    Katsuhiro HORIBA  Keiko OKAWA  Jun MURAI  

     
    INVITED PAPER

      Vol:
    E95-B No:7
      Page(s):
    2191-2199

    On the 11th of March, 2011, a massive earthquake hit the northeast region of Japan. The government of Japan needed to publish information regarding the earthquake and its influences. However, their capacity of Web services overflowed. They called the industry and academia for help for providing stable information service to the people. Industry and academia formed a team to answer the call and named themselves the “EQ project”. This paper describes how the EQ Project was organized and operated, and gives analyses of the statistics. An academic organization took the lead in the EQ Project. Ten organizations which consisted of commercial IT industry and academics specialized in Internet technology, were participating in the EQ Project and they structured the three clusters based on their relationships and technological approach. In WIDE Cluster, one of three clusters in the structure of EQ, the peak number of file accesses per day was over 90 thousand, the mobile browsers was 3.4% and foreign languages (translated contents) were referred 35%. We have also discussed the future information distribution strategies in emergency situation based on the experiences of the EQ Project, and proposed nine suggestions to the MEXT as a future strategy.

  • The Mechanism for Scalable Registry System with Aggregatable Address Allocation on WIDE 6bone

    Yuji SEKIYA  Hiromi WAKAI  Shu NAKAMAE  Kenji HIROSE  Jun MURAI  

     
    PAPER

      Vol:
    E82-D No:4
      Page(s):
    888-895

    The change over from IPv4 to IPv6 entails a potential increase in the number of records that the Registry System must maintain. Currently, only a few Network Information Centers (NICs), controlled by Internet Assigned Number Authority (IANA), operate their Registry Systems. As they concentrates data into several Registry System, it is not scalable. This paper focuses on the scalability issue in a Registry System and Mie Advanced Registry System (MARS) is proposed. Through the collaboration of independent Registry Systems, MARS ensures data consistency as well as making it possible to access data managed by other Registry Systems. A prototype system of MARS is implemented, maintained and managed on the WIDE 6bone. Some lessen from the operation of MARS give also described.

  • Design and Deployment of Post-Disaster Recovery Internet in 2011 Tohoku Earthquake

    Kotaro KATAOKA  Keisuke UEHARA  Masafumi OE  Jun MURAI  

     
    PAPER

      Vol:
    E95-B No:7
      Page(s):
    2200-2209

    In disaster sites of 2011 Tohoku Earthquake, digital communication was virtually unavailable due to the serious damage to the existing Internet and ICT resources. Thus there were urgent demands for recovering the Internet connectivity and first aid communication tools. This paper describes the design and deployment of networking systems that provide Internet connectivity using 3G mobile links or VSAT satellite links. In this paper we examine two approaches for post-disaster networking: quickly deployable package and on-demand networking. Based on a comparison of their characteristics and deployment experiences, this paper tries to extract lessons that contribute to improving the preparedness to another disaster. This paper also shares our significant operational experience acquired through supporting a maximum of 54 sites in Tohoku area including evacuation shelters, temporary hospitals and local government offices.

  • Linux IPv6 Stack Implementation Based on Serialized Data State Processing

    Hideaki YOSHIFUJI  Kazunori MIYAZAWA  Masahide NAKAMURA  Yuji SEKIYA  Hiroshi ESAKI  Jun MURAI  

     
    PAPER-Implementation and Operation

      Vol:
    E87-B No:3
      Page(s):
    429-436

    IPv6 is realized as the next generation internet platform, succeeding the current IPv4 internet environment. Linux, one of the major operating systems, has supported IPv6 since 1996, however, the quality of the protocol stack has not been good enough for professional operation. In this paper, we show our IPv6 stack implementation design regarding the neighbor management in Neighbor Discovery Protocol (NDP), the routing table management and the packet processing using XFRM architecture. The implementation is designed based on the Serialized Data State Processing, which aims at simpler object management so as to achieve stable, flexible and extensible IPv6 stack. According to the TAHI IPv6 Protocol Conformance Test Suite, we can show our implementation achieves enough implementation quality.

  • Otedama: A Relocatable RFID Information Repository Architecture

    Shigeya SUZUKI  Rodney VAN METER  Osamu NAKAMURA  Jun MURAI  

     
    PAPER

      Vol:
    E93-D No:11
      Page(s):
    2922-2931

    We present a novel RFID middleware architecture, Otedama, which makes use of a unique property of RFID information to improve performance. RFID tags are bound to items. New information related to an RFID tag is generated at the site where the ID exists, and the entity most interested in the history and the item itself is in close proximity to the RFID tag. To exploit this property, we propose a scheme which bundles information related to a specific ID into one object and moves that bundle to a nearby server as the RFID tag moves from place to place. By using this scheme, information is always accessible by querying a system near the physical location of the tag, providing better query performance. Additionally, the volume of records that must be kept by a repository manager is reduced, because the relocation naturally migrates data away as physical objects move. We show the effectiveness of this architecture by analyzing data from a major retailer, finding that information retrieval performance will be six times better, and the cost of search is possibly several times cheaper.

  • Real-Time Monitoring of Multicast Group Information

    Achmad BASUKI  Achmad Husni THAMRIN  Hitoshi ASAEDA  Jun MURAI  

     
    PAPER-Information Network

      Vol:
    E93-D No:8
      Page(s):
    2213-2222

    This paper presents a method to monitor information of a large-sized multicast group that can follow the group's dynamics in real-time while avoiding feedback implosion by using probabilistic polling. In particular, this paper improves the probabilistic-polling-based approach by deriving a reference mean value as the reference control value for the number of expected feedback from the properties of a binomial estimation model. As a result, our method adaptively changes its estimation parameters depending on the feedback from receivers in order to achieve a fast estimate time with high accuracy, while preventing the possible occurrence of feedback implosion. Our experimental implementation and evaluation on PlanetLab showed that the proposed method effectively controls the number of feedback and accurately estimates the size of a dynamic multicast group.

1-20hit(27hit)